Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Solved Assignments
Asked Questions
Answered Questions
Which of the following commands sets secret password to Cisco? enable secret password Cisco, enable secret cisco, enable secret Cisco or enable password Cisco.
What is the address range of the Class B network address in binary?110xxxxx, 0xxxxxxx, 10xxxxxx or 01xxxxxx.
The DoD model (also called the TCP/IP stack) has four layers. Which layer of DoD model is equivalent to Network layer of OSI model?
Which command is used to upgrade the IOS on Cisco router? copy tftp run, copy tftp start, config net or copy tftp flash.
What PPP protocol provides dynamic addressing, authentication, and multilink?
Which protocol does DHCP use at Transport layer? IP, TCP, UDP or ARP.
What are the two main types of access control lists (ACLs)? Standard, IEEE, Extended or Specialized.
Give three reasons why a computer system would require having some sorts of external storage device.
Analyze and assess any potential malicious attacks and threats that might be carried out against network.
Describe the function of input controls. Identify four types of input control and describe the function of each. Provide the example of data integrity error which can occur if each of these types of i
Collecting personal information and effectively posing as another individual is termed as the crime of: spooling, identity theft, spoofing or hacking.
An operating system runs multiple applications simultaneously called as: Multitasking, Multiprogramming or Programming.
A system where processing should be completed within certain time constraints suitable for the system Real time systems or Time sharing systems.
Viruses which aim at a boot sector of hard drive are infecting a very crucial component of the boot process: File infection virus, Boot virus, Network virus or E-mail virus.
Define the term computer? Explain and differentiate Hardware, Software and Programming concepts.
Define the term Information System? Describe about the established Information Systems and Networks in developing country.
What are the different facilities and components of operating system? Give the comparison between professional and home edition of windows.
What do you mean by binary Adder? Describe about 4-bit binary adder with a neat diagram.
Describe the difference between single linked list and double linked list. Describe about different operations performed on double linked list.
How do you inform regarding the installation of computer to employees?
This question concerns main security goals (confidentiality, integrity, availability). Explain a situation in which the goal of integrity is important, but there is not a need for confidentiality.
Discuss four major threats to database security. For each threat you identify, state at least one solution to that threat.
Discuss the characteristics of an organization for which a data warehouse would be suitable. Aside from huge amounts of money, what resources does an organization need to support a data warehouse or
"/home/gz" is my personal directory, and my working directory is "/home/gz/Documents" now. Which of the following directory path expression is valid and points to my working directory?
File management is one feature of an operating system. Describe five various tasks a USER can perform via commands (or other ways) that relate to disk files.